Nowadays, the world is becoming smarter, so as the technology, the new era is on the boom, which is blockchain because of its different use cases and benefits. The blockchain is a growing list of records called blocks...
详细信息
The security of industrial networks, particularly in industrial automation systems, is critical for ensuring system reliability and protecting sensitive data. This paper proposes a deeper anomaly detection system usin...
详细信息
ISBN:
(数字)9798331507695
ISBN:
(纸本)9798331507701
The security of industrial networks, particularly in industrial automation systems, is critical for ensuring system reliability and protecting sensitive data. This paper proposes a deeper anomaly detection system using the ResNet34 (Residual Network) model to identify and detect cyber-attacks in industrial networks, specifically focusing on Controller Area Network (CAN) systems. The study highlights the vulnerabilities in industrial communication protocols, such as CAN, Modbus, and Ethernet/IP, which are susceptible to cyber-attacks including replay, modification, and fuzzing attacks. These attacks can disrupt the functioning of industrial systems and cause significant damage. Experimental results show that the proposed model achieves a 100 % detection rate for all types of cyber-attacks, demonstrating its effectiveness in recognizing abnormal patterns and responding to changes in network behavior. The results confirm that the ResNet34-based deep anomaly detection model can be a valuable tool for strengthening the security of industrial networks by providing real-time detection of cyber-attacks, thereby ensuring the stability and safety of industrial automation systems.
The cryptocurrency boom has resulted in a substantial rise in energy usage and carbon emissions. The mining process of Bitcoin is notorious for its energy intensive process because it requires huge computational power...
详细信息
Classification based on association rules has proved able to get high precision and deal with data noise in real scenarios. However, very low support thresholds are used to get these results, generating a great number...
详细信息
This proposal outlines the development of a comprehensive educational platform aimed at bridging the Information Technology knowledge gap among Tamil-speaking students in Sri Lanka. The platform is designed to enhance...
详细信息
A common approach to explaining NLP models is to use importance measures that express which tokens are important for a prediction. Unfortunately, such explanations are often wrong despite being persuasive. Therefore, ...
A common approach to explaining NLP models is to use importance measures that express which tokens are important for a prediction. Unfortunately, such explanations are often wrong despite being persuasive. Therefore, it is essential to measure their faithfulness. One such metric is if tokens are truly important, then masking them should result in worse model performance. However, token masking introduces out-of-distribution issues, and existing solutions that address this are computationally expensive and employ proxy models. Furthermore, other metrics are very limited in scope. This work proposes an inherently faithfulness measurable model that addresses these challenges. This is achieved using a novel fine-tuning method that incorporates masking, such that masking tokens become in-distribution by design. This differs from existing approaches, which are completely model-agnostic but are inapplicable in practice. We demonstrate the generality of our approach by applying it to 16 different datasets and validate it using statistical in-distribution tests. The faithfulness is then measured with 9 different importance measures. Because masking is in-distribution, importance measures that themselves use masking become consistently more faithful. Additionally, because the model makes faithfulness cheap to measure, we can optimize explanations towards maximal faithfulness;thus, our model becomes indirectly inherently explainable. Copyright 2024 by the author(s)
Decision diagrams are an increasingly important tool in cutting-edge solvers for discrete optimization. However, the field of decision diagrams is relatively new, and is still incorporating the library of techniques t...
详细信息
The industrial sector has entered a phase of profound change which sees digital technologies being integrated into the heart of industrial processes. This fourth industrial era gives birth to a new generation of facto...
详细信息
This paper presents a novel fifteen-level two-source inverter topology that is reliable against source outages. The topology has two DC sources, a total of ten switches, and four DC-link capacitors. Level-shifted PWM ...
详细信息
As applications in IT have been spanning multiple containers across servers, kubernetes is being used extensively for automating software deployment, scaling and management. Kubernetes eases the container tasks and al...
详细信息
暂无评论